Results 41 to 50 of about 3,059,535 (353)
Use of a hybrid intelligence decision tree to identify mature B‐cell neoplasms
Abstract Background Mature B‐cell neoplasms are challenging to diagnose due to their heterogeneity and overlapping clinical and biological features. In this study, we present a new workflow strategy that leverages a large amount of flow cytometry data and an artificial intelligence approach to classify these neoplasms. Methods By combining mathematical
Inès Vergnolle+4 more
wiley +1 more source
Authentic Interpretation of the Constitution in the Croatian Parliamentary Law
Having in mind that the authentic interpretation is an interpretation of a legal norm that, due to its ambiguity or misinterpretation in practice, is provided by the same body that enacted it, the paper examines whether Croatian parliamentary law empowers the Croatian Parliament, as a constitution-maker, for giving an authentic interpretation of the ...
openaire +2 more sources
Probability on groups and an application to cryptography [PDF]
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye+2 more
doaj
PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal+7 more
core +2 more sources
The COVID-19-crisis has exposed the shortcomings of formal requirements for legal acts which involve the physical presence of others. This is in particular true with regard to last wills which require the physical presence of a notary and/or witnesses ...
J. W. A. Biemans
doaj +1 more source
Besides having to obey the Law on Notary Position and the Code of Ethics, a Notary must pay attention to certain principles, one of which is the Precautionary Principle.
Natasha Meydia Essiva
semanticscholar +1 more source
Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal
Fighting crime in cyberspace requires law enforcement authorities to immerse in a digital ocean of vast amount of information and also to acquire and objectify the evidence of criminal activity.
Christos Karagiannis, Kostas Vergidis
doaj +1 more source
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram+2 more
core +2 more sources
Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová+2 more
doaj +1 more source
Objective: to specify the models of legal regulation in the sphere of biometric identification and authentication with facial recognition technology in order to elaborate recommendations for increasing information security of persons and state-legal ...
D. Utegen, B. Zh. Rakhmetov
doaj +1 more source